BugId OOBW[4n]-4n~4n ed2.531 @ tests_x86.exe!wmain summary

BugId: OOBW[4n]-4n~4n ed2.531
Location: tests_x86.exe!wmain
Source: p:\dev\cbugid\tests\src\_tmain.cpp @ 484
Description: Heap corruption detected at 0x9EE0FFC; 4 bytes before a 16777216/0x1000000 bytes heap block at 0x9EE1000.
Version: tests_x86.exe: Wed May 10 23:52:12 2017 (59138B8C) (x86)
Security impact: Potentially exploitable security issue, if the corruption is attacker controlled.
Integrity level: 0x2000 (Medium Integrity; this process appears to not be sandboxed!)
Arguments: ['OutOfBounds', 'Heap', 'Write', '0x1000000', '-4', '4']

BugId version 2017-11-01 14:17. You may not use this version of BugId for commercial purposes. Please contact the author if you wish to use BugId commercially. Contact and licensing information can be found at the bottom of this report.

Stack

  1. verifier.dll!VerifierStopMessage + 0x27E (this frame is irrelevant to this bug)
  2. verifier.dll!AVrfpDphReportCorruptedBlock + 0x239 (this frame is irrelevant to this bug)
  3. verifier.dll!AVrfpDphCheckNormalHeapBlock + 0x11A (this frame is irrelevant to this bug)
  4. verifier.dll!AVrfpDphNormalHeapFree + 0x22 (this frame is irrelevant to this bug)
  5. verifier.dll!AVrfDebugPageHeapFree + 0xE3 (this frame is irrelevant to this bug)
  6. ntdll.dll!RtlDebugFreeHeap + 0x3C (this frame is irrelevant to this bug)
  7. ntdll.dll!RtlpFreeHeap + 0xD3D (this frame is irrelevant to this bug)
  8. ntdll.dll!RtlFreeHeap + 0x758 (this frame is irrelevant to this bug)
  9. tests_x86.exe!wmain + 0x1726 (id: ed2) [[p:\dev\cbugid\tests\src\_tmain.cpp @ 484]]
  10. tests_x86.exe!invoke_main + 0x1D (inlined function, id: 531)
  11. tests_x86.exe!__scrt_common_main_seh + 0xF9 [[f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl @ 253]]
  12. kernel32.dll!BaseThreadInitThunk + 0x24
  13. ntdll.dll!__RtlUserThreadStart + 0x2F
  14. ntdll.dll!_RtlUserThreadStart + 0x1B
⇓ click on the title of a section to open or close it.